SlideShare a Scribd company logo
1 of 38
Download to read offline
Document Safer




             http://www.markany.com




      2005
Document Safer



                      Agenda

•   Who is MarkAny?
•   Industry Issues – Information Protection
•   MarkAny Solution
•   References




                               © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer




MarkAny Corporate Overview

      We’ve been around…
       …We’re expanding




                  © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Corporate Overview - MarkAny

• Exclusive focus on digital information security
• Headquartered in Seoul, Korea
• Substantial on-going R&D activity
   – President, Dr. Jong Choi
   – 82 employees
• Major funding
   – Samsung Electronics ($2M in 2000 & 2002)
   – Olympus ($ 9M in 2001)
• 2004 Sales = $ 8M
   – 70% market share in Korea




                                     © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Corporate Overview – MarkAny

• Successful blue chip reference clients
   –   Samsung Electronics : 5000 Licenses
   –   LG Electronics : 30000 Licenses
   –   LG Chemical : 20000 Licenses
   –   Daewoo Heavy Industry : 1000 Licenses
   –   Hyundai Heavy Industry : 12000 Licenses
   –   SKC : 1000 Licenses
   –   ZTE(In China) : 10000 Licenses
   –   LG Philips : 3000 Licenses
   –   Panasonic(In Japan) :
   –   National Ministry of Defense (Korea) : 5000 Licenses
   –   Hynix Semiconductor (Hyundai) : 12000 Licenses




                                         © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


   Corporate Overview (cont.)

        Our R&D preserves corporate intellectual property

• Korean Patents Applied for: 98                                   8%
                                               16%
  1.   Base Technology : 8
                                                                                       Base
  2.   Watermarking : 43                                                               Technology
  3.   Document Security : 15                                                          Watermarking
  4.   Other/Related : 32
                                                                                       Other/Related

       Granted : 47                                                                    Document
                                                                             43%
                                                                                       Security
  • International Patents Applied For: 82     33%
       Granted : 5

    - PCT, US, Japan, China East Asia, etc.




                                              © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Corporate Overview – Technology


• Core technology = intellectual property
   – Digital Rights Management (DRM)
   – Digital watermarking
   – Encryption
• Application of core technology
   – Secure document management
   – Document forgery/alteration prevention systems
   – Safe document issue systems for e-government




                                       © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer




Security of Information

     Industry Issues




                © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Problem: Information Protection
  Sources of Company Security Violations

    Network Hacking                Internal Staff Related Leakage




                Business    Hard      Information                   Scout or “Double Agent”
       others
                Alliances   Copy         Trader

                                                               –




         The most serious financial losses occur due to internal leakage



                                                    © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer




The MarkAny Solution

The Answer to Industry Issues




                  © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Solution: Document Safer Overview

  - Document Safer protects valuable information from illegal copying & distribution
  - Audit trail of documents to ensure integrity & security
  - Manage access & distribution of intellectual property
     •     create, transfer, forward, read, print, edit, delete

                     File Server /                           Document Safer Server side
                     KMS / EDMS
                                                           • Access control to document
                         PDM
                            encrypted                        by each user or each group
                 inquiry       file                        • Enterprise security policy setting
                     Document
                     Document                              • Download encrypted documents
                      SAFER
                      SAFER

                 request     download                         Document Safer Client side

         Internal user                                     • Prevent copy & paste             Prevent
                                                                                              unauthorized
                                                           • Control save & print
                                                                                              user access
                                                           • Prevent screen capture           to documents
         External user

                                                          © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


How it works
              Administrator



              Manages security policy, user’s authority and monitors a robust audit trail using
              web-based management tool


             All documents are
             automatically encrypted
             according to user’s authority
             when user requests                                        User B is blocked from
             a document from
             DMS Server                    file                        approaching to DMS System
                                      ypt
                                en cr
                            ad
                        nlo
                   D ow
                                            f ile
                                       nal
                                o rigi            Document Management
                             ad
                      U p lo                      System with Document
                                        Safer Server
                          Authorized
                        Internal User A                                                              Unauthorized
                                                                                                    Internal User B

        Outflow                                                                                   Unauthorized
                                                                                                  internal user B
                                           Illegal external user can’t                            has no authority to
                                             Illegal external user can’t
                                               open any documents                                 open document
                                                open any documents

                                 External User



                                                               © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Document Safer: Functions

  MarkAny’s Document SAFER is a perfect solution to
  prevent unauthorized outflow of valuable information
  through Floppy, CD, E-Mail, etc.


  - Control of functions according to user’s authority & privilege
     read, edit, save, copy & paste, print (# of printings) etc.
  - Real-time Rights Management (control & change)
  - Preventing ‘Screen Capture’ or use of Capture Tools
  - Controlling time validity of a document
  - Monitoring the usage of document by log management
  - Tracking of printed documents’ outflow

                                              © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Open, Save Control

  When unauthorized user OPENs file   When authorized user tries to SAVE




                                                  Save function is inactive




                                       © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Edit, Print Control

   When authorized user tries to EDIT   When authorized user tries to PRINT




   Edit function is inactive
                                                        Print function is inactive




                                           © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Expiration Date Control
  Cannot access documents after Expiration date
    Automatically deleted from Storage and memory




                                              © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Real time Rights Management




A document downloaded from DMS server    Edit , save rights enabled in real time
without edit, save rights                without download again
                                         according to user’s authority


                                        © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Screen Capture Protection




                            © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Laptop check out

                               1   Request laptop check-out




                                              2 Approve laptop check-out




            3 Check laptop check-out status




                                               © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Printed Document Control

  Tracking documents when authorized user prints

  Watermark technology is
                                               Printed Document
  embedded
                                               2001-10-10 10:20:25
                                                     Development Team John Lee




   Tracking printed documents
   Controlling document printing
   and managing printing archives
   Revealing security information
   such as user data, copyright
                                         Copyright OOO
   data, etc.
   Showing document security        Printing Date/Division/User information
                                    Print – DRAFT/CONFIDENTIAL etc
   level
                                    Copyright information



                                     © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Automatic Encryption(Optional)

      Document is automatically                                     Every file of user’s PC is
       Document is automatically                                     Every file of user’s PC is
      encrypted when User create a                                  automatically & collectively
       encrypted when User create a                                  automatically & collectively
      new document or save a                                        encrypted
       new document or save a                                        encrypted
      existing document
       existing document

                                Create
                                             Doc


                      Edit                                                     Delete


                                                                                     Open
                      Save                   Authorized user
                                              Authorized user
                                                                            Print


                                                               Outflow

                                                                        Doc
                                                                               -->
                        Illegal user can’t open a document
                          Illegal user can’t open a document
                        which is automatically encrypted
                          which is automatically encrypted                                     External User
                        from User’s PC
                          from User’s PC
                                                               © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – External DRM (Optional)

   The way to distribute an encrypted document to outside
                                                       Login to external DRM web site


                                                             Select external distribution
                                                                       screen

                                                  Sender types receiver’s e-mail ID, document title,
                                                      document rights, description, file attach


                                        Sender sends an e-mail to receiver with basic information such as, URL


                                                Receiver receives an e-mail included URL information


                                           Receiver clicks URL to move external DRM web site to download           Outside receiver gets the following
                                                               The encrypted document                                          messages:
                                                                                                                   URL information that receiver can
                                                 NO
          Sign up for using external DRM
                                                                              Login to                             download the secure document and
                                                                       external DRM web site                          install document safer client
                                                                                                                                 software
     NO         Social ID Check?                                         Select document list



            User’s PC Key abstraction
                  & registration                                 Download the encrypted document




                                                                              Completion


                                                                                                  © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Web Safer (Optional)




                       © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Functions – Web-based Management tool

  Authority Management by user/group             Security Policy Management




  Log Management                                                                   Report




                                       © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer

Supported Platforms / File Formats
(See Supporting Detail)

  • Operating System or Database platforms
      Windows series supported : Windows NT/2000,XP,2003
      UNIX series supported: Solaris, HP-UX, IBM-AIX, etc.
      Linux platform is also supported
      Commercialized DBMS’s supported
      NT base : MS-SQL, ORACLE (ODBC)
      UNIX base : ORACLE, Informix, Sybase (Pre-Compiler)

  • Supported file formats
      General documents : MS Office(doc, excel, ppt), Adobe PDF, Paintshop Pro, Kodak
      Imaging, MS Paint, Notepad and Wordpad
      CAD documents: CATIA, Mentor, Zuken, AutoCAD, UniCAD, I-DEAS, PRO-E,
      Unigraphics, Univiewer, Parametric and so on
  • Supported systems
      KM,EDM,Groupware,EIP,PDM, etc(most type of Document management systems)

                                                  © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


How to get started with MarkAny Document Safer

• Complete situational assessment
   –   Information flow profile
   –   IT impact and requirements
   –   Target workgroup identification
   –   Identify success requirements and metrics
• License proposal
   – Server software, capabilities based
   – Client software, seat based
• Installation and support
   – Training, installation and on-going support
• Reference and continued roll-out


                                           © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Summary

•   Ease of Use – User Friendly
       No additional viewer – no loss of functionality of original application
        MDI (Multiple Document Interface) is supported-Vital for real-world productivity!
        Menu Control : unauthorized function is not applicable
        After encryption, the same format of original document is supported (DOC, XLS,
       PPT, HWP etc.)

•   Support the largest number of file formats
        Various CAD Files protection : e.g) Hynix Semiconductor, Samsung
        Semiconductor
        MS Office files, Text, PDF, HTML document

•   Printed document protection combined w/ Watermarking
        Tracking the printed document



                                                  © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Competitor Analysis
                            MarkAny                       Authentica                          SealedMedia

Product line up         Document SAFER 2.5
                   (Document security solution)
                            E-Page Safer
                    (Forgery security solution),
                            Content Safer          Authentica EDRM Suite 3.0    Sealed Media 3.3 Document
                  (Multimedia security solution), (Document security solution)       Security Solution
                             Web Safer                                            (Document / Multimedia
                   (Web page & content security                                      security solution)
                              solution)
                          MAIM,MAO,MAVI
                  (Image/Audio/Video Watermark
                              solution)
Server/client        Server : Windows 2000 or       Server: Windows or Sun     Server: Windows 2000, XP or
requirements             higher, Unix, Linux.                 Solaris.           later, Mac OS 9 and OS X
                   Client : Windows 98 or higher,    Client : Windows 98 or        support for PDF only.
                             Unix, Linux                      higher           Client: Windows 98, 2000, XP,
                                                                                        2003, NT 4.0.
File Format             MS Office, PDF, Text,
Supported           various image file formats,
                      Video/Audio file formats,                                MS Office, Adobe PDF, HTML,
                                                     MS Office, PDF, HTML,
                      source code related also,                                GIF, JPEG, PNG, MP3, MPEG-
                                                    JPEG, GIF, PNG, bitmap               1,MPEG-4
                       Most CAD file formats
                  (MENTOR, ZUKEN, AUTOCAD,
                         CATIA,PRO-E, etc.)
                                                             © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


Competitor Analysis
                                 MarkAny                  Authentica                       SealedMedia

  Encryption                AES, NIST Standard       128-bit RSA RC4 data
                                                                                            AES 128bit
  Algorithm                     encryption                encryption
                                                                                              RSA

  Additional Viewer       Not needed – SEAMLESS
                                                          necessary                          necessary
                                 Integration
  MDI Support
                                 Available              Not Available                      Not Available

  Automatic Encryption
                                 Available              Not Available                      Not Available

  File Extension                                      The other format of              The other format of
                             Original Format
                                                      original document                original document
  Print watermark
                                 Available              Not Available                      Not Available

  Laptop/ Document
  check out                      Available              Not Available                      Not Available

  Real time rights
  management                     Available              Not Available                      Not Available

  Policy support               Off-line policy,
                         Document Exchange policy,            N/A                                N/A
                           etc by user/group level

                                                         © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer



Supported File Formats

      Extension       Type                         Application
DOC                 MS WORD
XLS                MS EXCEL
                  MS PowerPoint           OFFICE 97/2000/XP/2003
PPT
PPS               MS PowerPoint

TXT                   TEXT                  Word PAD / Note PAD

JPG,BMP
                    IMGAGE            98,2000 : Kodak, XP : MS-Paint
JPEG,GIF,TIF
PSD,PSP             IMGAGE                    Paint Shop Pro 7.0
PSD,PSP             IMGAGE                      Photo Shop 7.0
PRM,EPS
WPG,WMF
EMF,CGM
PLT,VSD
                    IMGAGE                     Corel Draw 9, 11
CMX,CPX,
CDX,PDF
HTM,DCT
DXF,DWG




                                  © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer



Supported File Formats(Continued)

      Extension       Type                            Application
ASF,AVI           SOUND & IMAGE
SWF,MPEG                                          MIDIEA PLAYER
MPG,WAV
AI,DWG                IMAGE               Adobe Illustrator 8.0, 9.0, 10.0
JPG,BMP
GIF,TIF
PDF,EDS
SVG,DXF
TXT,SVGZ
OPP
                   Planning Tool                      Open Plan
BKP
SPW,JNB                                            Sigma Plot 10.0
NCF, PCM
                  Document Viewer                    Plus Viewer

HTM, HTML,MHT           I.E                           IE6.0 under




                                    © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer



Supported File Formats(Continued)
   Extension     Type                              Application
ATTR           CAD TOOL
                                 Mentor(PCB – V8.6_2.1, SRP – V8.7_5.1)

DWG, DXF       CAD TOOL   AutoCAD( R13, R14, 2000 Origin, LT, Mechanical, 2002
                          Origin, LT, 2004 Origin, LT, Mechanical, ADT 2002, ADT
                                                    2004
PCU, PCW
               CAD TOOL                   ZUKEN( BD,SD ) v6.0/7.0
SHT
PRT, ASM
BRW,SEC
               CAD TOOL               PRO-E 2001, PROEWildFire 2.0
FRM, LAY
DGM, MFG
DXF, STP
IGES           CAD TOOL                           PRO-E 2001
REP, MRK
MF1, MF2
               CAD TOOL                         I-DEAS V8.0/9.0

PRT, UDF
BMG, IGX
STP, DXF       CAD TOOL                      UniGraphics 18, NX2
DXG, CGM
JT

                                 © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer



Supported File Formats(Continued)
      Extension     Type                         Application
DRD, CPM          CAD TOOL
CPI                              Cadence (Allegro, Concept, Project)

*.*               CAD TOOL                      E-CAM V6.0

MDL, MDW
                  CAD TOOL                    UNIMECH V3.0

CATPART
CATDRAWING
                  CAD TOOL                        CATIA R5
CATPRODUCT


DXF,IGS
                  CAD TOOL                      TRIBON M3


DGN
                  CAD TOOL                   Micro Station/J 7

PS, DWG, EPSI
TIF, TIFF, PLT
OL, CC, CCZ       CAD Viewer              Product View 6.0~7.0
DXF, HPG, HPP
HPGL2, EDZ
*.*               CAD Viewer             Rxhighlight V3.0 / V4.0
DWG               CAD Viewer                   VOLO Viewer
                               © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer



Supported File Formats(Continued)
      Extension             Type                            Application
CGM, HPGL, TIF            CAD Viewer
                                                         EDAS VIEWER

PLT, GIF, TIF             CAD Viewer                        VIS Viewer
TIFF, JPG, JPEG, BMP,
CGM, JT
CDX                       CAD Viewer                  Chem. Draw Ultra V8
SCH                       CAD Viewer                    Power Logic V5.0
PCB                       CAD Viewer        Power PCB with Blaze Route V5.0.1
CAD, DWG, DXF
                          CAD Viewer                        Cadra V10

                        Document Viewer               MS OFFICE Viewer
                          Image Tool                      MS-Visio 2000
                        Document Tool                        Han Slide
                           CAD Tool                       AutoCAD 2005
                          Adobe PDF                         Acrobat 7.0
                          Image Tool                     3D Studio MAX




                                          © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


References

   IT& Manufacturing Industry (Technology Suite, Manufacturer Suite)
    Company Name                         Company Name

   Wireless Division of
                                         Korea Telecom
   Samsung Electronics


   Network Division of                    KT
   Samsung Electronics                    Research center
   Samsung
   Electro-mechanics                     LG-EDS (CNS)

   Terminal Division of                  LG Chemical
   LG Electronics

                                         LG Electronics Institute
   LG Electronics
                                         of Technology

   Digital Appliance Division of         Appeal Telecom
   LG Electronics

   LG Phillips LCD                       SK Chemical


   Renault Samsung                       Hynix
   Motors                                semiconductor



                                                © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


References

   Finance Industry (Finance Suite)   Government (Government Suite)
   Company Name                       Company Name

   Korea Life                         Ministry of Finance and
                                      Economy
                                      Ministry of National
   Dongbu Life
                                      Defense

                                      Ministry of Foreign
   Shinhan Bank
                                      Affairs and Trade


   Samsung Fire                       Ministry of Justice


   Industrial Bank of                 Gangnam-gu office
   Korea

   BC card                            Gyeonggi-do Province


                                      Gangwon-do Province
   Kyobo Life




                                            © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


References

    Company Name                        Business Area                      Product

   Panasonic Solution Technology Systems System Integration               DRM Solution

   ITX Corp.(Olympus)                    Electronics                      DRM Solution


                                                                          DRM Solution
   ZTE (In China)                        Telecommunication

                                                                          DRM Solution
   Huawei (In China)                     Telecommunication




                                                          © Copyright 2005 MarkAny Inc. All rights reserved.
Document Safer


               Thank-you!

•   Contact us:
•   www.markany.com
•   peterson@markany.com
•   (82) 2262-5202




                       © Copyright 2005 MarkAny Inc. All rights reserved.

More Related Content

What's hot

Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Webroot Construction sector datasheet
Webroot Construction sector datasheetWebroot Construction sector datasheet
Webroot Construction sector datasheetPaul Tompsett
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Systems, Inc.
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco SoldiSMAU
 

What's hot (20)

Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Hosted Contact Centre Security
Hosted Contact Centre SecurityHosted Contact Centre Security
Hosted Contact Centre Security
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Webroot Construction sector datasheet
Webroot Construction sector datasheetWebroot Construction sector datasheet
Webroot Construction sector datasheet
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX Compliance
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Smau Bari 2012 Marco Soldi
Smau Bari 2012   Marco SoldiSmau Bari 2012   Marco Soldi
Smau Bari 2012 Marco Soldi
 

Similar to Document%20 Safer%20 Introduction

Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introductionyonifine
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsEstuate, Inc.
 
Security Procedures
Security ProceduresSecurity Procedures
Security Proceduresmarkilyn
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 

Similar to Document%20 Safer%20 Introduction (20)

Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introduction
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 
Bettyboop
BettyboopBettyboop
Bettyboop
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 

Document%20 Safer%20 Introduction

  • 1. Document Safer http://www.markany.com 2005
  • 2. Document Safer Agenda • Who is MarkAny? • Industry Issues – Information Protection • MarkAny Solution • References © Copyright 2005 MarkAny Inc. All rights reserved.
  • 3. Document Safer MarkAny Corporate Overview We’ve been around… …We’re expanding © Copyright 2005 MarkAny Inc. All rights reserved.
  • 4. Document Safer Corporate Overview - MarkAny • Exclusive focus on digital information security • Headquartered in Seoul, Korea • Substantial on-going R&D activity – President, Dr. Jong Choi – 82 employees • Major funding – Samsung Electronics ($2M in 2000 & 2002) – Olympus ($ 9M in 2001) • 2004 Sales = $ 8M – 70% market share in Korea © Copyright 2005 MarkAny Inc. All rights reserved.
  • 5. Document Safer Corporate Overview – MarkAny • Successful blue chip reference clients – Samsung Electronics : 5000 Licenses – LG Electronics : 30000 Licenses – LG Chemical : 20000 Licenses – Daewoo Heavy Industry : 1000 Licenses – Hyundai Heavy Industry : 12000 Licenses – SKC : 1000 Licenses – ZTE(In China) : 10000 Licenses – LG Philips : 3000 Licenses – Panasonic(In Japan) : – National Ministry of Defense (Korea) : 5000 Licenses – Hynix Semiconductor (Hyundai) : 12000 Licenses © Copyright 2005 MarkAny Inc. All rights reserved.
  • 6. Document Safer Corporate Overview (cont.) Our R&D preserves corporate intellectual property • Korean Patents Applied for: 98 8% 16% 1. Base Technology : 8 Base 2. Watermarking : 43 Technology 3. Document Security : 15 Watermarking 4. Other/Related : 32 Other/Related Granted : 47 Document 43% Security • International Patents Applied For: 82 33% Granted : 5 - PCT, US, Japan, China East Asia, etc. © Copyright 2005 MarkAny Inc. All rights reserved.
  • 7. Document Safer Corporate Overview – Technology • Core technology = intellectual property – Digital Rights Management (DRM) – Digital watermarking – Encryption • Application of core technology – Secure document management – Document forgery/alteration prevention systems – Safe document issue systems for e-government © Copyright 2005 MarkAny Inc. All rights reserved.
  • 8. Document Safer Security of Information Industry Issues © Copyright 2005 MarkAny Inc. All rights reserved.
  • 9. Document Safer Problem: Information Protection Sources of Company Security Violations Network Hacking Internal Staff Related Leakage Business Hard Information Scout or “Double Agent” others Alliances Copy Trader – The most serious financial losses occur due to internal leakage © Copyright 2005 MarkAny Inc. All rights reserved.
  • 10. Document Safer The MarkAny Solution The Answer to Industry Issues © Copyright 2005 MarkAny Inc. All rights reserved.
  • 11. Document Safer Solution: Document Safer Overview - Document Safer protects valuable information from illegal copying & distribution - Audit trail of documents to ensure integrity & security - Manage access & distribution of intellectual property • create, transfer, forward, read, print, edit, delete File Server / Document Safer Server side KMS / EDMS • Access control to document PDM encrypted by each user or each group inquiry file • Enterprise security policy setting Document Document • Download encrypted documents SAFER SAFER request download Document Safer Client side Internal user • Prevent copy & paste Prevent unauthorized • Control save & print user access • Prevent screen capture to documents External user © Copyright 2005 MarkAny Inc. All rights reserved.
  • 12. Document Safer How it works Administrator Manages security policy, user’s authority and monitors a robust audit trail using web-based management tool All documents are automatically encrypted according to user’s authority when user requests User B is blocked from a document from DMS Server file approaching to DMS System ypt en cr ad nlo D ow f ile nal o rigi Document Management ad U p lo System with Document Safer Server Authorized Internal User A Unauthorized Internal User B Outflow Unauthorized internal user B Illegal external user can’t has no authority to Illegal external user can’t open any documents open document open any documents External User © Copyright 2005 MarkAny Inc. All rights reserved.
  • 13. Document Safer Document Safer: Functions MarkAny’s Document SAFER is a perfect solution to prevent unauthorized outflow of valuable information through Floppy, CD, E-Mail, etc. - Control of functions according to user’s authority & privilege read, edit, save, copy & paste, print (# of printings) etc. - Real-time Rights Management (control & change) - Preventing ‘Screen Capture’ or use of Capture Tools - Controlling time validity of a document - Monitoring the usage of document by log management - Tracking of printed documents’ outflow © Copyright 2005 MarkAny Inc. All rights reserved.
  • 14. Document Safer Functions – Open, Save Control When unauthorized user OPENs file When authorized user tries to SAVE Save function is inactive © Copyright 2005 MarkAny Inc. All rights reserved.
  • 15. Document Safer Functions – Edit, Print Control When authorized user tries to EDIT When authorized user tries to PRINT Edit function is inactive Print function is inactive © Copyright 2005 MarkAny Inc. All rights reserved.
  • 16. Document Safer Functions – Expiration Date Control Cannot access documents after Expiration date Automatically deleted from Storage and memory © Copyright 2005 MarkAny Inc. All rights reserved.
  • 17. Document Safer Functions – Real time Rights Management A document downloaded from DMS server Edit , save rights enabled in real time without edit, save rights without download again according to user’s authority © Copyright 2005 MarkAny Inc. All rights reserved.
  • 18. Document Safer Functions – Screen Capture Protection © Copyright 2005 MarkAny Inc. All rights reserved.
  • 19. Document Safer Functions – Laptop check out 1 Request laptop check-out 2 Approve laptop check-out 3 Check laptop check-out status © Copyright 2005 MarkAny Inc. All rights reserved.
  • 20. Document Safer Functions – Printed Document Control Tracking documents when authorized user prints Watermark technology is Printed Document embedded 2001-10-10 10:20:25 Development Team John Lee Tracking printed documents Controlling document printing and managing printing archives Revealing security information such as user data, copyright Copyright OOO data, etc. Showing document security Printing Date/Division/User information Print – DRAFT/CONFIDENTIAL etc level Copyright information © Copyright 2005 MarkAny Inc. All rights reserved.
  • 21. Document Safer Functions – Automatic Encryption(Optional) Document is automatically Every file of user’s PC is Document is automatically Every file of user’s PC is encrypted when User create a automatically & collectively encrypted when User create a automatically & collectively new document or save a encrypted new document or save a encrypted existing document existing document Create Doc Edit Delete Open Save Authorized user Authorized user Print Outflow Doc --> Illegal user can’t open a document Illegal user can’t open a document which is automatically encrypted which is automatically encrypted External User from User’s PC from User’s PC © Copyright 2005 MarkAny Inc. All rights reserved.
  • 22. Document Safer Functions – External DRM (Optional) The way to distribute an encrypted document to outside Login to external DRM web site Select external distribution screen Sender types receiver’s e-mail ID, document title, document rights, description, file attach Sender sends an e-mail to receiver with basic information such as, URL Receiver receives an e-mail included URL information Receiver clicks URL to move external DRM web site to download Outside receiver gets the following The encrypted document messages: URL information that receiver can NO Sign up for using external DRM Login to download the secure document and external DRM web site install document safer client software NO Social ID Check? Select document list User’s PC Key abstraction & registration Download the encrypted document Completion © Copyright 2005 MarkAny Inc. All rights reserved.
  • 23. Document Safer Web Safer (Optional) © Copyright 2005 MarkAny Inc. All rights reserved.
  • 24. Document Safer Functions – Web-based Management tool Authority Management by user/group Security Policy Management Log Management Report © Copyright 2005 MarkAny Inc. All rights reserved.
  • 25. Document Safer Supported Platforms / File Formats (See Supporting Detail) • Operating System or Database platforms Windows series supported : Windows NT/2000,XP,2003 UNIX series supported: Solaris, HP-UX, IBM-AIX, etc. Linux platform is also supported Commercialized DBMS’s supported NT base : MS-SQL, ORACLE (ODBC) UNIX base : ORACLE, Informix, Sybase (Pre-Compiler) • Supported file formats General documents : MS Office(doc, excel, ppt), Adobe PDF, Paintshop Pro, Kodak Imaging, MS Paint, Notepad and Wordpad CAD documents: CATIA, Mentor, Zuken, AutoCAD, UniCAD, I-DEAS, PRO-E, Unigraphics, Univiewer, Parametric and so on • Supported systems KM,EDM,Groupware,EIP,PDM, etc(most type of Document management systems) © Copyright 2005 MarkAny Inc. All rights reserved.
  • 26. Document Safer How to get started with MarkAny Document Safer • Complete situational assessment – Information flow profile – IT impact and requirements – Target workgroup identification – Identify success requirements and metrics • License proposal – Server software, capabilities based – Client software, seat based • Installation and support – Training, installation and on-going support • Reference and continued roll-out © Copyright 2005 MarkAny Inc. All rights reserved.
  • 27. Document Safer Summary • Ease of Use – User Friendly No additional viewer – no loss of functionality of original application MDI (Multiple Document Interface) is supported-Vital for real-world productivity! Menu Control : unauthorized function is not applicable After encryption, the same format of original document is supported (DOC, XLS, PPT, HWP etc.) • Support the largest number of file formats Various CAD Files protection : e.g) Hynix Semiconductor, Samsung Semiconductor MS Office files, Text, PDF, HTML document • Printed document protection combined w/ Watermarking Tracking the printed document © Copyright 2005 MarkAny Inc. All rights reserved.
  • 28. Document Safer Competitor Analysis MarkAny Authentica SealedMedia Product line up Document SAFER 2.5 (Document security solution) E-Page Safer (Forgery security solution), Content Safer Authentica EDRM Suite 3.0 Sealed Media 3.3 Document (Multimedia security solution), (Document security solution) Security Solution Web Safer (Document / Multimedia (Web page & content security security solution) solution) MAIM,MAO,MAVI (Image/Audio/Video Watermark solution) Server/client Server : Windows 2000 or Server: Windows or Sun Server: Windows 2000, XP or requirements higher, Unix, Linux. Solaris. later, Mac OS 9 and OS X Client : Windows 98 or higher, Client : Windows 98 or support for PDF only. Unix, Linux higher Client: Windows 98, 2000, XP, 2003, NT 4.0. File Format MS Office, PDF, Text, Supported various image file formats, Video/Audio file formats, MS Office, Adobe PDF, HTML, MS Office, PDF, HTML, source code related also, GIF, JPEG, PNG, MP3, MPEG- JPEG, GIF, PNG, bitmap 1,MPEG-4 Most CAD file formats (MENTOR, ZUKEN, AUTOCAD, CATIA,PRO-E, etc.) © Copyright 2005 MarkAny Inc. All rights reserved.
  • 29. Document Safer Competitor Analysis MarkAny Authentica SealedMedia Encryption AES, NIST Standard 128-bit RSA RC4 data AES 128bit Algorithm encryption encryption RSA Additional Viewer Not needed – SEAMLESS necessary necessary Integration MDI Support Available Not Available Not Available Automatic Encryption Available Not Available Not Available File Extension The other format of The other format of Original Format original document original document Print watermark Available Not Available Not Available Laptop/ Document check out Available Not Available Not Available Real time rights management Available Not Available Not Available Policy support Off-line policy, Document Exchange policy, N/A N/A etc by user/group level © Copyright 2005 MarkAny Inc. All rights reserved.
  • 30. Document Safer Supported File Formats Extension Type Application DOC MS WORD XLS MS EXCEL MS PowerPoint OFFICE 97/2000/XP/2003 PPT PPS MS PowerPoint TXT TEXT Word PAD / Note PAD JPG,BMP IMGAGE 98,2000 : Kodak, XP : MS-Paint JPEG,GIF,TIF PSD,PSP IMGAGE Paint Shop Pro 7.0 PSD,PSP IMGAGE Photo Shop 7.0 PRM,EPS WPG,WMF EMF,CGM PLT,VSD IMGAGE Corel Draw 9, 11 CMX,CPX, CDX,PDF HTM,DCT DXF,DWG © Copyright 2005 MarkAny Inc. All rights reserved.
  • 31. Document Safer Supported File Formats(Continued) Extension Type Application ASF,AVI SOUND & IMAGE SWF,MPEG MIDIEA PLAYER MPG,WAV AI,DWG IMAGE Adobe Illustrator 8.0, 9.0, 10.0 JPG,BMP GIF,TIF PDF,EDS SVG,DXF TXT,SVGZ OPP Planning Tool Open Plan BKP SPW,JNB Sigma Plot 10.0 NCF, PCM Document Viewer Plus Viewer HTM, HTML,MHT I.E IE6.0 under © Copyright 2005 MarkAny Inc. All rights reserved.
  • 32. Document Safer Supported File Formats(Continued) Extension Type Application ATTR CAD TOOL Mentor(PCB – V8.6_2.1, SRP – V8.7_5.1) DWG, DXF CAD TOOL AutoCAD( R13, R14, 2000 Origin, LT, Mechanical, 2002 Origin, LT, 2004 Origin, LT, Mechanical, ADT 2002, ADT 2004 PCU, PCW CAD TOOL ZUKEN( BD,SD ) v6.0/7.0 SHT PRT, ASM BRW,SEC CAD TOOL PRO-E 2001, PROEWildFire 2.0 FRM, LAY DGM, MFG DXF, STP IGES CAD TOOL PRO-E 2001 REP, MRK MF1, MF2 CAD TOOL I-DEAS V8.0/9.0 PRT, UDF BMG, IGX STP, DXF CAD TOOL UniGraphics 18, NX2 DXG, CGM JT © Copyright 2005 MarkAny Inc. All rights reserved.
  • 33. Document Safer Supported File Formats(Continued) Extension Type Application DRD, CPM CAD TOOL CPI Cadence (Allegro, Concept, Project) *.* CAD TOOL E-CAM V6.0 MDL, MDW CAD TOOL UNIMECH V3.0 CATPART CATDRAWING CAD TOOL CATIA R5 CATPRODUCT DXF,IGS CAD TOOL TRIBON M3 DGN CAD TOOL Micro Station/J 7 PS, DWG, EPSI TIF, TIFF, PLT OL, CC, CCZ CAD Viewer Product View 6.0~7.0 DXF, HPG, HPP HPGL2, EDZ *.* CAD Viewer Rxhighlight V3.0 / V4.0 DWG CAD Viewer VOLO Viewer © Copyright 2005 MarkAny Inc. All rights reserved.
  • 34. Document Safer Supported File Formats(Continued) Extension Type Application CGM, HPGL, TIF CAD Viewer EDAS VIEWER PLT, GIF, TIF CAD Viewer VIS Viewer TIFF, JPG, JPEG, BMP, CGM, JT CDX CAD Viewer Chem. Draw Ultra V8 SCH CAD Viewer Power Logic V5.0 PCB CAD Viewer Power PCB with Blaze Route V5.0.1 CAD, DWG, DXF CAD Viewer Cadra V10 Document Viewer MS OFFICE Viewer Image Tool MS-Visio 2000 Document Tool Han Slide CAD Tool AutoCAD 2005 Adobe PDF Acrobat 7.0 Image Tool 3D Studio MAX © Copyright 2005 MarkAny Inc. All rights reserved.
  • 35. Document Safer References IT& Manufacturing Industry (Technology Suite, Manufacturer Suite) Company Name Company Name Wireless Division of Korea Telecom Samsung Electronics Network Division of KT Samsung Electronics Research center Samsung Electro-mechanics LG-EDS (CNS) Terminal Division of LG Chemical LG Electronics LG Electronics Institute LG Electronics of Technology Digital Appliance Division of Appeal Telecom LG Electronics LG Phillips LCD SK Chemical Renault Samsung Hynix Motors semiconductor © Copyright 2005 MarkAny Inc. All rights reserved.
  • 36. Document Safer References Finance Industry (Finance Suite) Government (Government Suite) Company Name Company Name Korea Life Ministry of Finance and Economy Ministry of National Dongbu Life Defense Ministry of Foreign Shinhan Bank Affairs and Trade Samsung Fire Ministry of Justice Industrial Bank of Gangnam-gu office Korea BC card Gyeonggi-do Province Gangwon-do Province Kyobo Life © Copyright 2005 MarkAny Inc. All rights reserved.
  • 37. Document Safer References Company Name Business Area Product Panasonic Solution Technology Systems System Integration DRM Solution ITX Corp.(Olympus) Electronics DRM Solution DRM Solution ZTE (In China) Telecommunication DRM Solution Huawei (In China) Telecommunication © Copyright 2005 MarkAny Inc. All rights reserved.
  • 38. Document Safer Thank-you! • Contact us: • www.markany.com • peterson@markany.com • (82) 2262-5202 © Copyright 2005 MarkAny Inc. All rights reserved.